Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks
Table 2
Application protocol attacks.
Attack type
Attacks
Application scan
Modbus version scanner PLC Modbus mode identification PLC IO scan status Report slave ID Function code scan
Improper command execution
Force listen only mode Read/write request to a PLC Slave device busy exception code delay Acknowledge exception code delay Broadcast request from a client